Collection of the cheat sheets useful for pentesting
created at Nov. 29, 2016, midnight
Database security suite. Database proxy with field-level encryption, search through encrypted data, SQL injections prevention, intrusion detection, honeypots. Supports client-side and proxy-side ("transparent") encryption. SQL, NoSQL.
created at Nov. 14, 2016, 4:23 p.m.
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
created at Oct. 18, 2016, 7:29 a.m.
🔥 A fully open source audit logs service and embeddable UI easily deployed to your own Kubernetes cluster. Brought to you by replicated.com and boxyhq.com 🚀
created at Oct. 4, 2016, 1:51 p.m.
The Mobile Application Security Testing Guide (MASTG) is a comprehensive manual for mobile app security testing and reverse engineering. It describes the technical processes for verifying the controls listed in the OWASP Mobile Application Security Verification Standard (MASVS).
created at Sept. 30, 2016, 8:22 a.m.
A curated list of resources related to Industrial Control System (ICS) security.
created at Sept. 27, 2016, 1:48 p.m.
A Windows Batch script and a Unix Bash script to comprehensively collect host forensic data during incident response.
created at Aug. 2, 2016, 9:01 p.m.
A collection of OSX and iOS security resources
created at July 31, 2016, 2:39 a.m.
A modern tool for Windows kernel exploration and tracing with a focus on security
created at March 25, 2016, 11:28 a.m.
A collected list of awesome security talks
created at Jan. 19, 2016, 11:25 a.m.
A curated list of Awesome Threat Intelligence resources
created at Dec. 21, 2015, 11:31 a.m.
Infection Monkey - An open-source adversary emulation platform
created at Aug. 30, 2015, 7:22 a.m.